Description
When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
Published: 2024-03-27
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-26974 When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
Ubuntu USN Ubuntu USN USN-6718-1 curl vulnerabilities
Ubuntu USN Ubuntu USN USN-6718-3 curl vulnerabilities
History

Wed, 30 Jul 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Fedoraproject
Fedoraproject fedora
Haxx
Haxx curl
Netapp
Netapp bootstrap Os
Netapp h300s
Netapp h300s Firmware
Netapp h410s
Netapp h410s Firmware
Netapp h500s
Netapp h500s Firmware
Netapp h700s
Netapp h700s Firmware
Netapp hci Compute Node
Netapp ontap
Netapp ontap Select Deploy Administration Utility
CPEs cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Fedoraproject
Fedoraproject fedora
Haxx
Haxx curl
Netapp
Netapp bootstrap Os
Netapp h300s
Netapp h300s Firmware
Netapp h410s
Netapp h410s Firmware
Netapp h500s
Netapp h500s Firmware
Netapp h700s
Netapp h700s Firmware
Netapp hci Compute Node
Netapp ontap
Netapp ontap Select Deploy Administration Utility

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00601}

epss

{'score': 0.00617}


Tue, 29 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-436
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Apple Macos
Fedoraproject Fedora
Haxx Curl
Netapp Bootstrap Os H300s H300s Firmware H410s H410s Firmware H500s H500s Firmware H700s H700s Firmware Hci Compute Node Ontap Ontap Select Deploy Administration Utility
Redhat Jboss Core Services
cve-icon MITRE

Status: PUBLISHED

Assigner: curl

Published:

Updated: 2025-02-13T17:32:29.487Z

Reserved: 2024-02-29T11:05:48.981Z

Link: CVE-2024-2004

cve-icon Vulnrichment

Updated: 2024-08-01T18:56:22.517Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-27T08:15:41.173

Modified: 2025-07-30T19:42:14.363

Link: CVE-2024-2004

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-27T00:00:00Z

Links: CVE-2024-2004 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses